Learn More
The Tor network is a widely used system for anonymous communication. However, Tor is known to be vulnerable to attackers who can observe traffic at both ends of the communication path. In this paper, we show that prior attacks are just the tip of the iceberg. We present a suite of new attacks, called Raptor, that can be launched by Autonomous Systems (ASes)(More)
Tor is vulnerable to network-level adversaries who can observe both ends of the communication to deanonymize users. Recent work has shown that Tor is susceptible to the previously unknown active BGP routing attacks, called RAPTOR attacks, which expose Tor users to more network-level adversaries. In this paper, we aim to mitigate and detect such active(More)
BACKGROUND AND OBJECTIVE Primary lung cancer has been common malignant tumors. Accurate preoperative N staging can avoid unnecessary surgical operations, and patients with N3 has non-surgical treatment of indications. The aim of this study is to investigate the clinical value of ultrasound in the diagnosis of supraclavicular lymph node metastasis and(More)
Swine manure is considered to be a reservoir for antibiotic resistance genes (ARGs) but little is known about the variations in ARGs during the co-composting of swine manure with Chinese medicinal herbal residues (CMHRs). Thus, this study explored the effects of CMHRs on the variations in ARGs during co-composting with swine manure. The results showed that(More)
Digital certificates play an important role in secure and private communication using TLS. Thus, vulnerabilities in the process of issuing digital certificates (identity verification) can have devastating consequences for the security and privacy of online communications. In this talk, we explore the impact of BGP hijack and interception attacks on the(More)
People sometimes choose word-like abbreviations to refer to items with a long description. These abbreviations usually come from the descriptive text of the item and are easy to remember and pronounce, while preserving the key idea of the item. Coming up with a nice abbreviation is not an easy job, even for human. Previous assistant naming systems compose(More)
Injury caused by fall events is one of the greatest threats for elderly adults. This article introduces a system of fall detection including a wearable device based on Bluetooth communication, a triaxial accelerometer and a mobile phone connected to the Internet. The wearable device is used to collect the acceleration data of users, while the mobile phone(More)
This paper presents a flexible capacitive tactile sensing array based on Flexible Printed Circuit Board(FPCB) technology. Several prototype flexible tactile sensors have been successfully fabricated by using simple processes. The sensing array consists of two flexible printed circuit boards as sensing electrodes and insulation layer between them. This(More)
  • 1